Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

KEYS: Remove key_type::def_lookup_type

Remove key_type::def_lookup_type as it's no longer used. The information now
defaults to KEYRING_SEARCH_LOOKUP_DIRECT but may be overridden by
type->match_preparse().

Signed-off-by: David Howells <dhowells@redhat.com>
Acked-by: Vivek Goyal <vgoyal@redhat.com>

+5 -14
-1
crypto/asymmetric_keys/asymmetric_type.c
··· 228 228 .match_free = asymmetric_key_match_free, 229 229 .destroy = asymmetric_key_destroy, 230 230 .describe = asymmetric_key_describe, 231 - .def_lookup_type = KEYRING_SEARCH_LOOKUP_ITERATE, 232 231 }; 233 232 EXPORT_SYMBOL_GPL(key_type_asymmetric); 234 233
-1
crypto/asymmetric_keys/pkcs7_key_type.c
··· 72 72 */ 73 73 static struct key_type key_type_pkcs7 = { 74 74 .name = "pkcs7_test", 75 - .def_lookup_type = KEYRING_SEARCH_LOOKUP_DIRECT, 76 75 .preparse = pkcs7_preparse, 77 76 .free_preparse = user_free_preparse, 78 77 .instantiate = generic_key_instantiate,
-3
include/linux/key-type.h
··· 81 81 */ 82 82 size_t def_datalen; 83 83 84 - /* Default key search algorithm. */ 85 - unsigned def_lookup_type; 86 - 87 84 /* vet a description */ 88 85 int (*vet_description)(const char *description); 89 86
-1
security/keys/big_key.c
··· 33 33 */ 34 34 struct key_type key_type_big_key = { 35 35 .name = "big_key", 36 - .def_lookup_type = KEYRING_SEARCH_LOOKUP_DIRECT, 37 36 .preparse = big_key_preparse, 38 37 .free_preparse = big_key_free_preparse, 39 38 .instantiate = generic_key_instantiate,
+5 -6
security/keys/internal.h
··· 112 112 const struct cred *cred; 113 113 struct key_match_data match_data; 114 114 unsigned flags; 115 - #define KEYRING_SEARCH_LOOKUP_TYPE 0x0001 /* [as type->def_lookup_type] */ 116 - #define KEYRING_SEARCH_NO_STATE_CHECK 0x0002 /* Skip state checks */ 117 - #define KEYRING_SEARCH_DO_STATE_CHECK 0x0004 /* Override NO_STATE_CHECK */ 118 - #define KEYRING_SEARCH_NO_UPDATE_TIME 0x0008 /* Don't update times */ 119 - #define KEYRING_SEARCH_NO_CHECK_PERM 0x0010 /* Don't check permissions */ 120 - #define KEYRING_SEARCH_DETECT_TOO_DEEP 0x0020 /* Give an error on excessive depth */ 115 + #define KEYRING_SEARCH_NO_STATE_CHECK 0x0001 /* Skip state checks */ 116 + #define KEYRING_SEARCH_DO_STATE_CHECK 0x0002 /* Override NO_STATE_CHECK */ 117 + #define KEYRING_SEARCH_NO_UPDATE_TIME 0x0004 /* Don't update times */ 118 + #define KEYRING_SEARCH_NO_CHECK_PERM 0x0008 /* Don't check permissions */ 119 + #define KEYRING_SEARCH_DETECT_TOO_DEEP 0x0010 /* Give an error on excessive depth */ 121 120 122 121 int (*iterator)(const void *object, void *iterator_data); 123 122
-2
security/keys/user_defined.c
··· 26 26 */ 27 27 struct key_type key_type_user = { 28 28 .name = "user", 29 - .def_lookup_type = KEYRING_SEARCH_LOOKUP_DIRECT, 30 29 .preparse = user_preparse, 31 30 .free_preparse = user_free_preparse, 32 31 .instantiate = generic_key_instantiate, ··· 47 48 */ 48 49 struct key_type key_type_logon = { 49 50 .name = "logon", 50 - .def_lookup_type = KEYRING_SEARCH_LOOKUP_DIRECT, 51 51 .preparse = user_preparse, 52 52 .free_preparse = user_free_preparse, 53 53 .instantiate = generic_key_instantiate,